CN107870860A - Bury a checking system and method - Google Patents

Bury a checking system and method Download PDF

Info

Publication number
CN107870860A
CN107870860A CN201710312809.1A CN201710312809A CN107870860A CN 107870860 A CN107870860 A CN 107870860A CN 201710312809 A CN201710312809 A CN 201710312809A CN 107870860 A CN107870860 A CN 107870860A
Authority
CN
China
Prior art keywords
bury
point data
data
buries
client
Prior art date
Application number
CN201710312809.1A
Other languages
Chinese (zh)
Other versions
CN107870860B (en
Inventor
黄华
陈志平
唐洵
张冲
陈灯霞
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Priority to CN201710312809.1A priority Critical patent/CN107870860B/en
Publication of CN107870860A publication Critical patent/CN107870860A/en
Application granted granted Critical
Publication of CN107870860B publication Critical patent/CN107870860B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3676Test management for coverage analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Abstract

The invention provides one kind to bury a checking system, and the system is applied to server.The system includes a series of functional modules.Pass through these functional modules, server buries point data and buries point data summary info by what network received that client transmits in real time, analyzed in real time burying point data, point data will be buried and be converted to structural data from unstructured data, the point data of burying of structuring is contrasted with burying point data summary info, judge whether the application software of client buries the situation of point data loss, can also calculate client passback buries dot coverage.

Description

Bury a checking system and method
Technical field
The present invention relates to a kind of data analysis system and method, more particularly to one kind to bury a checking system and method.
Background technology
With the fast development of mobile Internet, the various application software of mobile client emerge in an endless stream.In order to study use Family behavior and the functional effect of application software, it will usually set many to bury a little in application software.User is touched using application software Hair bury a little corresponding to function when, client can will bury a related data and pass server end back.Due to network environment influence or end End application software there may be the situation of code missing, and what server end received buries the possible inaccuracy of point data, therefore needs to burying Point data is verified.A verification is buried at present using desk checking mode.It is numerous due to burying point data, desk checking efficiency It is low, and error-prone.
The content of the invention
In view of the foregoing, it is necessary to one kind is provided and buries a checking system and method, can be buried a little to what client returned Data obtain in real time, automatically and analysis, improve the efficiency and accuracy for burying point data checking.
First, to achieve the above object, the present invention provides one kind and buries a checking system, runs on server.The system bag Include:
Data reception module, for by network receive client transmit in real time bury point data and bury point data summary believe Breath;
Data processing module, for being analyzed in real time burying point data, point data will be buried and changed from unstructured data For structural data;And
Data check module, for the point data of burying of structuring to be contrasted with burying point data summary info, judge to bury Whether point data loses.
Alternatively, a checking system provided by the invention of burying also includes computing module, and the computing module is used for:
By structuring bury that point data and server end store it is complete bury an authority file and be compared, calculate client Dot coverage is buried in passback.
Alternatively, a checking system provided by the invention of burying also includes report generation module, and this report generation module is used for A verification report is buried in generation.
Alternatively, a checking system provided by the invention of burying also includes prompting module, and the prompting module is used to bury a little to cover Lid rate and/or bury verification report and send to default client.
In addition, the present invention, which also provides one kind, buries a verification method, server is run on.This method includes:
Data reception step:Bury point data by what network received that client transmits in real time and bury point data summary info;
Data processing step:Analyzed in real time burying point data, point data will be buried and be converted to knot from unstructured data Structure data;And
Data check step:The point data of burying of structuring is contrasted with burying point data summary info, points are buried in judgement According to whether losing.
Alternatively, a verification method provided by the invention that buries also includes calculation procedure:
By structuring bury that point data and server end store it is complete bury an authority file and be compared, calculate client Dot coverage is buried in passback.
Alternatively, a verification method provided by the invention that buries also includes report generation step:
A verification report is buried in generation.
Alternatively, a verification method provided by the invention that buries also includes reminding step:
Dot coverage will be buried and/or bury a verification report and sent to default client.
Prior art is compared, a checking system and method provided by the invention that buries can make server receive client biography After that send buries point data and bury point data summary info, analyzed burying point data, handled in real time, point data will be buried from non-knot After structure data are converted to structural data, judge whether the application software of client buries the situation of point data loss, also Client passback can be calculated buries dot coverage.
Brief description of the drawings
Fig. 1 is that the present invention buries an applied environment figure for checking system preferred embodiment.
Fig. 2 is that the present invention buries a running environment figure for checking system preferred embodiment.
Fig. 3 is that the present invention buries a functional block diagram for checking system preferred embodiment.
Fig. 4 buries a flow chart for verification method preferred embodiment for the present invention.
Embodiment
As shown in figure 1, it is that the present invention buries an applied environment figure for the preferred embodiment of checking system 10.This buries a checking system 10 are applied to server 1.Server 1 connects multiple client 3 by network 2.Network 2 can be LAN, wide area network, metropolitan area The network of net, PAN etc. type;It can be cable network, or wireless network.Client 3 can be on table Type computer, notebook, tablet personal computer, mobile phone, or it is other application software is installed, can be carried out by network 2 and server 1 The terminal installation of communication.
As shown in Fig. 2 it is that the present invention buries a running environment figure for the preferred embodiment of checking system 10.Server 1 includes, but It is not limited only to, memory 11, processor 12 and display 13.
A program code for checking system 10 is buried in the storage of memory 11, and the memory 11 can include at least one type Storage medium, the storage medium include flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memories etc. Deng), random access storage device (RAM), static random-access memory (SRAM), read-only storage (ROM), electric erasable can compile Journey read-only storage (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..
Processor 12, which reads and performed from memory 11, buries a program code for checking system 10, there is provided buries a checking system 10 following function.An implementing result for checking system 10 is buried in the display of display 13.
Fig. 2 illustrate only the server 1 with component 11-13, it should be appreciated that server 1 can include it is more or The less component of person.Each client 3 (Fig. 2 only shows one) is provided with one or more application software 30, and (Fig. 2 only shows one It is individual).The present embodiment illustrates by taking an application software 30 as an example.The publisher of the application software 30 is set in the application software 30 Many is buried a little, for analyzing the user of client 3 to the operation behavior of the application software 30 and/or testing the application software 30 Functional effect.When user uses the application software 30, bury and be a little triggered, client 3 records buries points by user's triggering Point data summary info is buried according to and comprising user's complete operation behavior, and point data will be buried by network 2 and to bury point data general Information transmission is wanted to server 1.Server 1 bury a checking system 10 to receive bury point data and bury point data summary letter Breath is handled, analyzed, and judges whether the application software 30 of client 3 buries the situation of point data loss.
Further, burying a test system 10 can also be by the memory 11 for burying point data and server 1 received The complete point data of burying buried in an authority file of the relevant application software 30 of storage is compared, and calculates what client 3 returned Bury dot coverage.Afterwards, bury a test system 10 and can also generate and bury verification report, and dot coverage will be buried by network 2 And bury a verification report and send to default client 3.In the present embodiment, client 3 can be the user of application software 30, It can also be the exploitation side of application software 30.
As shown in figure 3, it is that the present invention buries a functional block diagram for the preferred embodiment of checking system 10.
In one embodiment, this bury a checking system 10 include data reception module 110, data processing module 120 and Data check module 130.
Data reception module 110, points are buried for receive the application software 30 that transmits in real time of client 3 by network 2 According to and bury point data summary info.The complete behavior that point data summary info have recorded user's operation and application software 30 is buried, such as User performs 5 operations when using the application software 30, triggers 30 is buried a little, and these information can be all fully recorded in Bury in point data summary info.Influenceed by network 2, or code missing be present in the application software 30 of client 3, What client 3 was passed back buries the situation that point data may be lacked or lost.
Data processing module 120, for being analyzed in real time burying point data, point data will be buried and turned from unstructured data It is changed to structural data.In the present embodiment, bury a checking system 10 and utilize search engine, for example, search engine of increasing income Elasticsearch, it is automatic, obtain that client 3 returns in real time buries point data, it is ensured that bury point data once reaching server 1, It can be searched, avoid temporal delay.
The point data of burying that client 3 returns be unstructured data, for example, it is probably one including a lot of to bury point data The text of character:
2017-02-2320:57:21
423|3010026410614|248c382809043ba84a8312ac1ce302085|865199028189698| 460013950475581||5.0.0|Android4.4.4|Android|HMNOTE1LTE|61.158.152.208| scmiui.com|00:00:00:00:00:00 | 20009 | 3 (action_id and process_id, two constitute this and bury a little Unique mark) | { " ssid ":"CMCC-EDU","bssid":"00:26:7a:2b:43:bb","appid":"10013"," signal":-60,"openid":"4100026420614","msg":0}|PA1000_WIFI
Further, data processing module 120 buries point data using search engine Elasticsearch by non-structured Structural data is converted into, tissue is carried out by a predefined model or in a manner of pre-defining, is stored in database.Example Such as, Elasticsearch buries in point data extraction and buries an information from non-structured, such as buries identification information a little " process_id:3"、"action_id:40001 ", bury a little corresponding to the information such as user's action type and time, write structure The corresponding array of data.Search engine Elasticsearch is by the non-structured other information buried in point data, such as client Hold IP address, MAC Address etc., the corresponding array of the information such as version of client application software, also write structure data.
The data instance of structuring after being handled below for data processing module 120:
Data check module 130, for the point data of burying of structuring to be contrasted with burying point data summary info, judge Whether application software 30 buries the situation of point data loss.Used for example, burying and user being have recorded in point data summary info 30 are triggered during application software 30 to bury a little, and structuring bury only have in point data this 30 bury a little in 26 bury and to believe Breath, then just there are 4 to bury point data and lost.
In another embodiment, this bury a checking system 10 include data reception module 110, data processing module 120, Data check module 130 and computing module 140.
Data reception module 110, points are buried for receive the application software 30 that transmits in real time of client 3 by network 2 According to and bury point data summary info.The complete behavior that point data summary info have recorded user's operation and application software 30 is buried, such as User performs 5 operations when using the application software 30, triggers 30 is buried a little, and these information can be all fully recorded in Bury in point data summary info.Influenceed by network 2, or code missing be present in the application software 30 of client 3, What client 3 was passed back buries the situation that point data may be lacked or lost.
Data processing module 120, for being analyzed in real time burying point data, point data will be buried and turned from unstructured data It is changed to structural data.In the present embodiment, bury a checking system 10 and utilize search engine, for example, search engine of increasing income Elasticsearch, it is automatic, obtain that client 3 returns in real time buries point data, it is ensured that bury point data once reaching server 1, It can be searched, avoid temporal delay.
The point data of burying that client 3 returns is unstructured data.For example, bury point data be probably one include it is a lot of The text (example above please be join) of character.Data processing module 120 will be non-using search engine Elasticsearch The point data of burying of structuring is converted into structural data, and group is carried out by a predefined model or in a manner of pre-defining Knit, be stored in database.For example, Elasticsearch buries in point data extraction and bury an information from non-structured, such as bury a little Identification information " process_id:3"、"action_id:40001 ", bury a little corresponding to user's action type and time etc. letter Breath, the corresponding array of write structure data.Search engine Elasticsearch buries other in point data by non-structured Information, such as the information such as client ip address, MAC Address etc., the version of client application software, also write structure data Corresponding array.
Data check module 130, for the point data of burying of structuring to be contrasted with burying point data summary info, judge Whether application software 30 buries the situation of point data loss.Used for example, burying and user being have recorded in point data summary info 30 are triggered during application software 30 to bury a little, and structuring bury only have in point data this 30 bury a little in 26 bury and to believe Breath, then just there are 4 to bury point data and lost.
Computing module 140, for the point data of burying of structuring completely to be buried with what is stored in the memory 11 of server end 1 Point authority file is compared, and calculate the passback of client 3 buries dot coverage, for example, 26/30=86.7%.
In another embodiment, this bury a checking system 10 include data reception module 110, data processing module 120, Data check module 130, computing module 140 and report generation module 150.
Data reception module 110, points are buried for receive the application software 30 that transmits in real time of client 3 by network 2 According to and bury point data summary info.The complete behavior that point data summary info have recorded user's operation and application software 30 is buried, such as User performs 5 operations when using the application software 30, triggers 30 is buried a little, and these information can be all fully recorded in Bury in point data summary info.Influenceed by network 2, or code missing be present in the application software 30 of client 3, What client 3 was passed back buries the situation that point data may be lacked or lost.
Data processing module 120, for being analyzed in real time burying point data, point data will be buried and turned from unstructured data It is changed to structural data.In the present embodiment, bury a checking system 10 and utilize search engine, for example, search engine of increasing income Elasticsearch, it is automatic, obtain that client 3 returns in real time buries point data, it is ensured that bury point data once reaching server 1, It can be searched, avoid temporal delay.
The point data of burying that client 3 returns is unstructured data.For example, bury point data be probably one include it is a lot of The text (example above please be join) of character.Data processing module 120 will be non-using search engine Elasticsearch The point data of burying of structuring is converted into structural data, and group is carried out by a predefined model or in a manner of pre-defining Knit, be stored in database.For example, Elasticsearch buries in point data extraction and bury an information from non-structured, such as bury a little Identification information " process_id:3"、"action_id:40001 ", bury a little corresponding to user's action type and time etc. letter Breath, the corresponding array of write structure data.Search engine Elasticsearch buries other in point data by non-structured Information, such as the information such as client ip address, MAC Address etc., the version of client application software, also write structure data Corresponding array.
Data check module 130, for the point data of burying of structuring to be contrasted with burying point data summary info, judge Whether application software 30 buries the situation of point data loss.Used for example, burying and user being have recorded in point data summary info 30 are triggered during application software 30 to bury a little, and structuring bury only have in point data this 30 bury a little in 26 bury and to believe Breath, then just there are 4 to bury point data and lost.
Computing module 140, for the point data of burying of structuring completely to be buried with what is stored in the memory 11 of server end 1 Point authority file is compared, and calculate the passback of client 3 buries dot coverage, for example, 26/30=86.7%.
Report generation module 150 buries a verification report for generation.It is described to bury a verification report and include, but not limited to bury The relevant information of application software 30, such as the information such as application software title, version corresponding to point verification, verify generation time and The information such as the relevant information of server 1, check results data.This is buried a verification report and is stored in clothes by report generation module 150 The memory 11 of business device 1.
In another embodiment, this buries a checking system 10 except including data reception module 110, data processing module 120th, data check module 130, computing module 140 and report generation module 150, in addition to prompting module 160.Data reception Block 110, data processing module 120, data check module 130, the function of computing module 140 and report generation module 150 please join Described in foregoing embodiments.Prompting module 160, then it is used to bury dot coverage and/or bury a verification report to send to default Client 3.
The prompting module 160 can be buried dot coverage by bury that checking is calculated every time and bury a verification report Send to default client 3, such as bury the work computer of an engineer.
Can also be that, when what is be calculated buries dot coverage and be less than pre-set threshold value (such as 85%), a verification is buried in transmission Report and the prompting message of preset format, such as " software identification is * * *, version number is * * * software buries dot coverage For ###, it is excessive to bury point data miss rate, please check and adjust and bury a scheme ", to the default work computer for burying an engineer.
As shown in figure 4, the present invention buries a flow chart for verification method preferred embodiment.
In one embodiment, this, which buries a checking systems approach, can only include step S110, S120 and S130.
Step S110, the application software 30 that data reception module 110 is transmitted in real time by the reception of network 2 client 3 are buried Point data and bury point data summary info.The complete behavior that point data summary info have recorded user's operation and application software 30 is buried, Such as user is performed 5 operations when using the application software 30, triggers 30 and bury a little, these information all can intactly be remembered Record is in point data summary info is buried.Influenceed by network 2, or the application software 30 of client 3 has code missing Situation, what client 3 was passed back buries the situation that point data may be lacked or lost.
Step S120, data processing module 120 are analyzed burying point data in real time, will bury point data from unstructured number According to being converted to structural data.In the present embodiment, bury a checking system 10 and utilize search engine, for example, search engine of increasing income Elasticsearch, it is automatic, acquisition client 3 passback in real time to bury point data, it is ensured that to bury point data one and reach server 1, i.e., It can be searched, avoid temporal delay.
The point data of burying that client 3 returns be unstructured data, for example, it is probably one including a lot of to bury point data The text of character:
2017-02-2320:57:21
423|3010026410614|248c382809043ba84a8312ac1ce302085|865199028189698| 460013950475581||5.0.0|Android4.4.4|Android|HMNOTE1LTE|61.158.152.208| scmiui.com|00:00:00:00:00:00 | 20009 | 3 (action_id and process_id, two constitute this and bury a little Unique mark) | { " ssid ":"CMCC-EDU","bssid":"00:26:7a:2b:43:bb","appid":"10013"," signal":-60,"openid":"4100026420614","msg":0}|PA1000_WIFI
Non-structured point data of burying is converted into knot by data processing module 120 using search engine Elasticsearch Structure data, tissue is carried out by a predefined model or in a manner of pre-defining, is stored in database.For example, Elasticsearch buries in point data extraction and buries an information from non-structured, such as buries identification information " process_ a little id:3"、"action_id:40001 ", bury a little corresponding to the information such as user's action type and time, the phase of write structure data Answer array.Search engine Elasticsearch is by the non-structured other information buried in point data, such as client ip The corresponding array of the information such as location, MAC Address etc., the version of client application software, also write structure data.
It is the data instance of the structuring in step S120 after the processing of data processing module 120 below:
Step S130, data check module 130 are contrasted the point data of burying of structuring with burying point data summary info, Judge whether application software 30 buries the situation of point data loss.Exist for example, burying and have recorded user in point data summary info Buried a little using triggering 30 during application software 30, and structuring bury in point data only have this 30 bury a little in 26 bury a little Information, then just there are 4 to bury point data and lost.
In another embodiment, this, which buries a verification method, includes step S110, S120, S130 and S140.
Step S110, the application software 30 that data reception module 110 is transmitted in real time by the reception of network 2 client 3 are buried Point data and bury point data summary info.The complete behavior that point data summary info have recorded user's operation and application software 30 is buried, Such as user is performed 5 operations when using the application software 30, triggers 30 and bury a little, these information all can intactly be remembered Record is in point data summary info is buried.Influenceed by network 2, or the application software 30 of client 3 has code missing Situation, what client 3 was passed back buries the situation that point data may be lacked or lost.
Step S120, data processing module 120 are analyzed burying point data in real time, will bury point data from unstructured number According to being converted to structural data.In the present embodiment, bury a checking system 10 and utilize search engine, for example, search engine of increasing income Elasticsearch, it is automatic, acquisition client 3 passback in real time to bury point data, it is ensured that to bury point data one and reach server 1, i.e., It can be searched, avoid temporal delay.
The point data of burying that client 3 returns is unstructured data.For example, bury point data be probably one include it is a lot of The text (example above please be join) of character.Data processing module 120 will be non-using search engine Elasticsearch The point data of burying of structuring is converted into structural data, and group is carried out by a predefined model or in a manner of pre-defining Knit, be stored in database.For example, Elasticsearch buries in point data extraction and bury an information from non-structured, such as bury a little Identification information " process_id:3"、"action_id:40001 ", bury a little corresponding to user's action type and time etc. letter Breath, the corresponding array of write structure data.Search engine Elasticsearch buries other in point data by non-structured Information, such as the information such as client ip address, MAC Address etc., the version of client application software, also write structure data Corresponding array.
Step S130, data check module 130 are contrasted the point data of burying of structuring with burying point data summary info, Judge whether application software 30 buries the situation of point data loss.Exist for example, burying and have recorded user in point data summary info Buried a little using triggering 30 during application software 30, and structuring bury in point data only have this 30 bury a little in 26 bury a little Information, then just there are 4 to bury point data and lost.
Step S140:Computing module 140 by structuring to bury point data complete with being stored in the memory 11 of server end 1 A sharp authority file that buries is compared, and calculate the passback of client 3 buries dot coverage, for example, 26/30=86.7%.
In another embodiment, this, which buries a verification method, includes step S110, S120, S130, S140 and S150.
Step S110, the application software 30 that data reception module 110 is transmitted in real time by the reception of network 2 client 3 are buried Point data and bury point data summary info.The complete behavior that point data summary info have recorded user's operation and application software 30 is buried, Such as user is performed 5 operations when using the application software 30, triggers 30 and bury a little, these information all can intactly be remembered Record is in point data summary info is buried.Influenceed by network 2, or the application software 30 of client 3 has code missing Situation, what client 3 was passed back buries the situation that point data may be lacked or lost.
Step S120, data processing module 120 are analyzed burying point data in real time, will bury point data from unstructured number According to being converted to structural data.In the present embodiment, bury a checking system 10 and utilize search engine, for example, search engine of increasing income Elasticsearch, it is automatic, acquisition client 3 passback in real time to bury point data, it is ensured that to bury point data one and reach server 1, i.e., It can be searched, avoid temporal delay.
The point data of burying that client 3 returns is unstructured data.For example, bury point data be probably one include it is a lot of The text (example above please be join) of character.Data processing module 120 will be non-using search engine Elasticsearch The point data of burying of structuring is converted into structural data, and group is carried out by a predefined model or in a manner of pre-defining Knit, be stored in database.For example, Elasticsearch buries in point data extraction and bury an information from non-structured, such as bury a little Identification information " process_id:3"、"action_id:40001 ", bury a little corresponding to user's action type and time etc. letter Breath, the corresponding array of write structure data.Search engine Elasticsearch buries other in point data by non-structured Information, such as the information such as client ip address, MAC Address etc., the version of client application software, also write structure data Corresponding array.
Step S130, data check module 130 are contrasted the point data of burying of structuring with burying point data summary info, Judge whether application software 30 buries the situation of point data loss.Exist for example, burying and have recorded user in point data summary info Buried a little using triggering 30 during application software 30, and structuring bury in point data only have this 30 bury a little in 26 bury a little Information, then just there are 4 to bury point data and lost.
Step S140:Computing module 140 by structuring to bury point data complete with being stored in the memory 11 of server end 1 A sharp authority file that buries is compared, and calculate the passback of client 3 buries dot coverage, for example, 26/30=86.7%.
Step S150:A verification report is buried in the generation of report generation module 150.It is described to bury a verification report and include but unlimited In burying the relevant information of application software 30 corresponding to verification, such as the information such as application software title, version, verify generation Time and the information such as the relevant information of server 1, check results data.This is buried a verification report and deposited by report generation module 150 It is stored in the memory 11 of server 1.
In another embodiment, this bury checking systems approach except including step S110, S120, S130, S140 and S150, step S160 can also be included.Step S110, the operation that S120, S130, S140 and S150 are performed please join reality above Apply described in example.In step S160, prompting module 16 will bury dot coverage and/or bury a verification report and send to default client 3。
The prompting module 160 can be buried dot coverage by bury that checking is calculated every time and bury a verification report Send to default client 3, such as bury the work computer of an engineer.Can also be, when what is be calculated buries dot coverage During less than pre-set threshold value (such as 85%), the prompting message for burying a verification report and preset format, such as " software identification are sent The dot coverage that buries for the software that * * *, version number are * * * is ###, and it is excessive to bury point data miss rate, please check and adjust and bury a little Scheme ", to the default work computer for burying an engineer.
It should be noted last that the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although ginseng The present invention is described in detail according to preferred embodiment, it will be understood by those within the art that, can be to the present invention Technical scheme modify or equivalent substitution, without departing from the spirit and scope of technical solution of the present invention.

Claims (10)

1. one kind buries a checking system, server is run on, it is characterised in that the system includes:
Data reception module, bury point data for receive that client transmits in real time by network and bury point data summary info;
Data processing module, for being analyzed in real time burying point data, point data will be buried and be converted to knot from unstructured data Structure data;And
Data check module, for the point data of burying of structuring to be contrasted with burying point data summary info, points are buried in judgement According to whether losing.
2. bury a checking system as claimed in claim 1, it is characterised in that the system also includes:
Computing module, for by structuring bury that point data and server end store it is complete bury an authority file and be compared, Calculate client passback buries dot coverage.
3. bury a checking system as claimed in claim 1 or 2, it is characterised in that the system also includes:
Report generation module, a verification report is buried for generating.
4. bury a checking system as claimed in claim 1 or 2, it is characterised in that the system also includes:
Prompting module, sent for that will bury dot coverage and/or bury a verification report to default client.
5. bury a checking system as claimed in claim 1, it is characterised in that the point data summary info that buries have recorded user Operate the behavior of client application software.
6. bury a checking system as claimed in claim 1, it is characterised in that the structural data is with a predefined mould Type or the mode pre-defined, which store, buries an information.
7. one kind buries a verification method, server is run on, it is characterised in that this method includes:
Data reception step:Bury point data by what network received that client transmits in real time and bury point data summary info;
Data processing step:Analyzed in real time burying point data, point data will be buried and be converted to structuring from unstructured data Data;And
Data check step:The point data of burying of structuring is contrasted with burying point data summary info, point data is buried in judgement is No loss.
8. bury a verification method as claimed in claim 7, it is characterised in that this method also includes:
Calculation procedure:By structuring bury that point data and server end store it is complete bury an authority file and be compared, calculate Dot coverage is buried in client passback.
9. bury a verification method as claimed in claim 7, it is characterised in that the point data summary info that buries have recorded user Operate the behavior of client application software.
10. bury a verification method as claimed in claim 7, it is characterised in that the structural data is predefined with one Model or the mode pre-defined, which store, buries an information.
CN201710312809.1A 2017-05-05 2017-05-05 Buried point verification system and method CN107870860B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710312809.1A CN107870860B (en) 2017-05-05 2017-05-05 Buried point verification system and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710312809.1A CN107870860B (en) 2017-05-05 2017-05-05 Buried point verification system and method
PCT/CN2018/085722 WO2018202171A1 (en) 2017-05-05 2018-05-04 Buried point verification system and method

Publications (2)

Publication Number Publication Date
CN107870860A true CN107870860A (en) 2018-04-03
CN107870860B CN107870860B (en) 2020-12-15

Family

ID=61761481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710312809.1A CN107870860B (en) 2017-05-05 2017-05-05 Buried point verification system and method

Country Status (2)

Country Link
CN (1) CN107870860B (en)
WO (1) WO2018202171A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664401A (en) * 2018-05-11 2018-10-16 阿里巴巴集团控股有限公司 Bury a little rational appraisal procedure and device
WO2018202171A1 (en) * 2017-05-05 2018-11-08 平安科技(深圳)有限公司 Buried point verification system and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561777A (en) * 2008-04-14 2009-10-21 中兴通讯股份有限公司 System and method for realizing coverage rate test
CN102158890A (en) * 2011-02-16 2011-08-17 中国联合网络通信集团有限公司 Methods, equipment and systems for sending and receiving test data
CN106156212A (en) * 2015-04-22 2016-11-23 阿里巴巴集团控股有限公司 A kind of collecting method and system and terminal thereof and server
CN106294101A (en) * 2015-05-19 2017-01-04 阿里巴巴集团控股有限公司 The page gets method of testing and device ready
CN106469185A (en) * 2016-08-29 2017-03-01 浪潮电子信息产业股份有限公司 A kind of method carrying out data collection in website statistics
CN106528432A (en) * 2016-12-12 2017-03-22 北京三快在线科技有限公司 Construction method and apparatus for test scene data, and buried point test method
CN106571949A (en) * 2016-09-23 2017-04-19 北京五八信息技术有限公司 Event tracking point processing method and apparatus

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915296B (en) * 2015-06-29 2018-07-10 北京金山安全软件有限公司 Bury the querying method and device of a test method, data
CN105046601A (en) * 2015-07-09 2015-11-11 传成文化传媒(上海)有限公司 User data processing method and system
CN107870860B (en) * 2017-05-05 2020-12-15 平安科技(深圳)有限公司 Buried point verification system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561777A (en) * 2008-04-14 2009-10-21 中兴通讯股份有限公司 System and method for realizing coverage rate test
CN102158890A (en) * 2011-02-16 2011-08-17 中国联合网络通信集团有限公司 Methods, equipment and systems for sending and receiving test data
CN106156212A (en) * 2015-04-22 2016-11-23 阿里巴巴集团控股有限公司 A kind of collecting method and system and terminal thereof and server
CN106294101A (en) * 2015-05-19 2017-01-04 阿里巴巴集团控股有限公司 The page gets method of testing and device ready
CN106469185A (en) * 2016-08-29 2017-03-01 浪潮电子信息产业股份有限公司 A kind of method carrying out data collection in website statistics
CN106571949A (en) * 2016-09-23 2017-04-19 北京五八信息技术有限公司 Event tracking point processing method and apparatus
CN106528432A (en) * 2016-12-12 2017-03-22 北京三快在线科技有限公司 Construction method and apparatus for test scene data, and buried point test method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
潘一鸣: "数据埋点:从采集到评估", 《HTTPS://ZHUANLAN.ZHIHU.COM/P/30145653》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018202171A1 (en) * 2017-05-05 2018-11-08 平安科技(深圳)有限公司 Buried point verification system and method
CN108664401A (en) * 2018-05-11 2018-10-16 阿里巴巴集团控股有限公司 Bury a little rational appraisal procedure and device

Also Published As

Publication number Publication date
WO2018202171A1 (en) 2018-11-08
CN107870860B (en) 2020-12-15

Similar Documents

Publication Publication Date Title
US20190068750A1 (en) System and Method for Improving Internet Communication by Using Intermediate Nodes
US9462009B1 (en) Detecting risky domains
US9703675B2 (en) Structured logging and instrumentation framework
CN104283843B (en) A kind of method, apparatus and system that user logs in
He et al. Location cheating: A security challenge to location-based social network services
Thing et al. Live memory forensics of mobile phones
CN104601685B (en) A kind of method for playing music and device of intelligent sound box
CN104426885B (en) Abnormal account providing method and device
US10079842B1 (en) Transparent volume based intrusion detection
US10572639B2 (en) Selectively providing personal information and access to functionality on lock screen based on biometric user authentication
CN105099811B (en) A kind of interface test method and device
US20170366967A1 (en) Method and browser for browsing web page, and storage medium
Olsson et al. Computer forensic timeline visualization tool
US20150271202A1 (en) Method, device, and system for detecting link layer hijacking, user equipment, and analyzing server
Barmpatsalou et al. A critical review of 7 years of Mobile Device Forensics
EP2691848B1 (en) Determining machine behavior
CN109067541B (en) Data verification method and device based on block chain and electronic equipment
US20140237593A1 (en) Method, device and system for detecting security of download link
CN101605074B (en) Method and system for monitoring Trojan Horse based on network communication behavior characteristic
CN104462534B (en) network information sharing method and device
Hupperich et al. On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?
CN105516133B (en) User identity verification method, server and client
CN105553917B (en) Method and system for detecting webpage bugs
US9952834B2 (en) Distribution of applications with a saved state
US9954746B2 (en) Automatically generating service documentation based on actual usage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant